A Strategy for JADC2

If you’ve spent even just a few minutes reading the DoD Summary of the Joint All-Domain Command and Control Strategy since it was released last March, you’d quickly take away several underlying themes to the overarching strategy: flexibility, adaptability, interoperability, reliability, and scalability are critical to a successful approach.  In other words, to achieve “Sense, Make Sense and Act” decision dominance, Joint All Domain Command and Control cannot be rigid monolith of hardware.   To truly succeed it will require a software defined approach with end-to-end security inherent in the development process.  Consider the 6 guiding principles of the JADC2 strategy:

  1. Information sharing capability improvements are designed and scaled at the enterprise level.
  2. Joint Force C2 improvements employ layered security features.
  3. JADC2 data fabric consists of efficient, evolvable, and broadly applicable common data standards and architectures.
  4. Joint Force C2 must be resilient in degraded and contested electromagnetic environments.
  5. Department development and implementation processes must be unified to deliver more effective cross-domain capability options.
  6. Department development and implementation processes must execute at faster speeds.

DevSecOps and Software Defined Communications for JADC2

The concept of JADC2 “transcends any single capability or platform.”  It is an adaptive suite of capabilities that responds quickly to changing demands.  The path to achieve this is software defined and will be delivered through a proven DevSecOps platform.  The Sigma Defense DevSecOps framework and pipeline takes a fully automated approach to software development infrastructure that allows the environment to scale resources faster than traditional network standard protocols.  This process allows users to integrate new software, modify legacy software and incorporate new hardware quickly and securely to deployed systems in an agile, secure, and proven manner.   Critical for JADC2, the Sigma Defense DevSecOps platform is not constrained by physical requirements, as it can be deployed in an on-prem environment, in the cloud and even at forward operating basis via our mobile platform

To meet the challenges of JADC2 – collecting, processing, analyzing, securing, and transporting large amounts of data from multiple sources in near-real time, a software-led approach that is quickly adaptable, scalable, and secure is critical to achieving the objectives outlined in the guiding principles.  As we learned from our recent AI demonstration at the USSOCOM Technical Experimentation 23-1 in Avon Park, Florida, requirements can change quickly, and the ability to quickly adjust, is critical to mission success.  The example above focused on rapidly developing, training, and deploying AI algorithms, but equally essential is its ability to operate in Denied, Disrupted, Intermittent and Limited-bandwidth (DDIL) and contested environments.  Sigma Defense’s software based approach to comms as the tactical edge allows for rapid adaptability to shifting and unstable environments.

Our mission is to autonomously connect people systems and data from space to operator.  The path to achieve that mission and support the DoD vision of JADC2 is through software that is developed and delivered in an accredited DevSecOps environment.  Many can claim that they have a DevSecOps practice, but few the depth and breadth of experience to achieve Authority to Operate (ATO) from the U.S. Navy that has been accomplished with Black Pearl.  Through our experience with Platform One for the Air Force and The Forge developing software for Aegis Combat Systems, we have quietly amassed a resume of experience that charts a vision for helping the DoD achieve the vision for Joint All Domain Command and Control.

Learn more on our website: www.sigmadefense.com